General

  • Target

    c3ca6be22568f162549a411b768a662c3b1792d0ecbe33466835ccc46b70f559

  • Size

    98KB

  • Sample

    220520-z437wsgfcl

  • MD5

    ea6a09aa2e08cd0157b6ab57a8d18f91

  • SHA1

    c98d2ca13735ed3cf522dc67aa5ffc71497153e8

  • SHA256

    c3ca6be22568f162549a411b768a662c3b1792d0ecbe33466835ccc46b70f559

  • SHA512

    8f00c947ff427c2f02f67ec13c179d06aab0b6340db45a6e8961184b0d7177a44c1fa45e6160c50857cce34ca3d732117a3982007ad3fd9280442419dce8c8c4

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      169KB

    • MD5

      420a90f5c00d78de1053dad31408582c

    • SHA1

      b897f39976bf0eeec833b47558550765cf16df54

    • SHA256

      e49e34bfeed9d527f6a2c80df9f388d89705278aafa1aa2b250556754ac38944

    • SHA512

      e193f40b16fa11240ffc746d0f894d68c200c7641bb393d68f9551e5668d230a4070dbdd62a34daed980cd951f229791d79bb5906efb5c35e295bda685d81e6a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks